Future Success to Tech Companies

Do you know what is common between Fred smith, Steve jobs, Oprahwinfrey, Steven Spielberg ,Henry Ford and Tim Ferris?? They all failed in their first startup. A significant reason of business failures is lack of ability to scale business globally. Close to 50% of the start up to midsize companies tend to fail in early…

Browser Forensics

When we say Digital Forensics, we mean the process by which we identify the crucial evidence, which is then extracted using various methods, and the same is preserved to be presented in the court of law, after proper documentation. This is a more of an art than science, in which we hunt for crucial electronic…

Data Destruction

Policy for Destruction: Does the above phrase ring a bell? Do you wonder why there should be a policy in place for “Destruction”. Are we living in a hypocritical world? Well, some destructions are for good!!!! Organizations that deal a lot with sensitive data need these “destructions” at its best. The trouble is “deleting” the…

Data Ownership

Introduction Let’s start with the most important question which many organizations face today – Who is responsible for implementing data protection?? You would be hearing various responses ranging from “it’s everybody’s job”, “it’s teamwork”, to “its business analysts’ responsibility” etc.  In such a scenario where does the obligation rest? In an ever-changing business / competitive…

The Payment Card Industry Data Security Standard

Introduction Digital payment & economy is growing at an astounding pace across the globe irrespective of the continents. In the preceding year, the global transaction value was US$3859 Billion (source: Statistica). With such volumes rising year after year, Fintech organizations face a lot of challenges in placing the appropriate checks and balance to ensure that…

DevSecOps

Introduction Before the advent of DevOps, most organizations performed their products’ security checks at the final stages of the software development life cycle (SDLC), irrespective of the development model adapted. Since the focus was predominantly on application development, security was deemed to be less important at other stages. Security checks are performed very late in…

Sourcing Using Google – Part 3

Bells & Whistles for Sourcing While we understood how Google+ has been steadily growing in popularity and size backed by powerful search options from Google, we also saw what kind of Boolean searches can be performed. In this final part of this series, let us now look at how these Boolean functions can be converted…